Exploitable Flaws in Mitel MiCollab Exposed
Cybersecurity researchers have uncovered a serious Mitel MiCollab vulnerability platform, exposing critical security risks. The flaw tracked as CVE-2024-41713 with a CVSS score of 9.8, results from inadequate input validation in the NuPoint Unified Messaging (NPM) component. This vulnerability allows attackers to perform path traversal attacks, enabling unauthorized file access and administrative actions.
Mitel MiCollab is a comprehensive communication platform that integrates chat, voice, video, and SMS messaging with applications like Microsoft Teams. Its NPM component facilitates voicemail access through various methods, including Microsoft Outlook. According to WatchTowr Labs, the vulnerability could be exploited by sending manipulated HTTP requests to the ReconcileWizard component, granting attackers access to sensitive system files like “/etc/passwd” without authentication.
Further analysis revealed that this vulnerability could be combined with an unpatched arbitrary file read flaw to extract critical system data. While the file read flaw has a lower CVSS score of 2.7 and does not permit file modifications or privilege escalation, its combination with CVE-2024-41713 magnifies potential risks.
Patch Released to Address Security Risks
Mitel addressed the criticaMitel MiCollab vulnerability with the release of MiCollab version 9.8 SP2 (9.8.2.12) on October 9, 2024. The update also resolves a separate high-risk SQL injection vulnerability (CVE-2024-47223, CVSS score: 9.4) affecting the Audio, Web, and Video Conferencing (AWV) component. This flaw could enable attackers to execute arbitrary database queries, potentially rendering the system inoperable.
Mitel’s advisory highlighted the implications of the patched vulnerabilities. Exploitation could compromise system confidentiality, integrity, and availability, allowing unauthorized access to provisioning information and administrative functionalities. The company urged users to update to the latest version to safeguard against these risks.
Sonny Macdonald, a security researcher, underscored the lessons from this investigation, noting that vulnerability research can succeed without full source code access. “This case illustrates how detailed CVE descriptions and strategic internet searches can uncover significant weaknesses,” he said.
Emerging Threats in IoT Devices
The Mitel MiCollab vulnerability disclosure coincides with revelations from Rapid7 about security flaws in Lorex 2K Indoor Wi-Fi Security Cameras. These defects, tracked from CVE-2024-52544 to CVE-2024-52548, could be chained together to achieve remote code execution (RCE).
According to researcher Stephen Fewer, the exploit chain operates in two phases. The first phase bypasses authentication, enabling attackers to reset the device’s admin password. The second phase leverages this access to execute stack-based buffer overflows, allowing OS-level commands to run with root privileges. The vulnerabilities could potentially grant attackers live access to video and audio feeds or control the device remotely.
These findings highlight the persistent risks in both enterprise and consumer technology environments, emphasizing the need for proactive cybersecurity measures and timely updates to mitigate evolving threats.